Sciweavers

4469 search results - page 687 / 894
» Comparing and Combining Profiles
Sort
View
TPDS
2008
125views more  TPDS 2008»
15 years 4 months ago
Computation-Efficient Multicast Key Distribution
Efficient key distribution is an important problem for secure group communications. The communication and storage complexity of multicast key distribution problem has been studied ...
Lihao Xu, Cheng Huang
140
Voted
TPDS
2008
124views more  TPDS 2008»
15 years 4 months ago
Efficient Breadth-First Search on the Cell/BE Processor
Multicore processors are an architectural paradigm shift that promises a dramatic increase in performance. But, they also bring an unprecedented level of complexity in algorithmic ...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...
123
Voted
CGF
2005
84views more  CGF 2005»
15 years 4 months ago
Perceptual Evaluation of Impostor Representations for Virtual Humans and Buildings
In large-scale simulations involving complex scenes, such as cities inhabited by crowds, simplifications are almost always necessary to achieve interactive frame-rates. Level of D...
John Hamill, Rachel McDonnell, Simon Dobbyn, Carol...
TROB
2008
86views more  TROB 2008»
15 years 4 months ago
Visual SLAM for Flying Vehicles
The ability to learn a map of the environment is important for numerous types of robotic vehicles. In this paper, we address the problem of learning a visual map of the ground usin...
Bastian Steder, Giorgio Grisetti, Cyrill Stachniss...
TSMC
2008
172views more  TSMC 2008»
15 years 4 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank